Professional Documents
Culture Documents
PAPERS
MOBILE COMPUTING
2 Mark Questions
UNIT I
1) What are the categories of Mobile services?
Bearer services
Tele services
Supplementary services
2)What are the services provided by supplementary services?
User identification
Call redirection
Call forwarding
Closed user groups
Multiparty Communication
3) What are the four types of handover available in GSM?
1.Intra cell Handover
2.Inter cell Intra BSC Handover
3.Inter BSC Intra MSC handover
4.Inter MSC Handover
4.What is meant by GPRS?
The General Packet Radio Service provides packet mode transfer for applications
that exhibit traffic patterns such as frequent transmission of small volumes.
5)What are subsystems in GSM system?
Radio subsystem(RSS)
Network & Switching subsystem(NSS)
Operation subsystem(OSS)
6)What are the information in SIM?
card type, serial no, list of subscribed services
Personal Identity Number(PIN)
Pin Unlocking Key(PUK)
An Authentication Key(KI)
7)Define Normal Burst?
The frame used for normal data transmission within a time slot is called Normal
Burst.
8)What are the logical channels in GSM?
Traffic channel(TCH)
Control channel(CCH)
9) what is meant by beacon?
A beacon contains a timestamp and other management information used for
power management and roaming.
e.g., identification of the base station subsystem(BSS)
10. What are the reasons for delays in GSM for packet data traffic.
1. Different data rates provided by traffic channels are low.
2. Authentication and encryption also makes the packet data transmission low.
3. Various interferences and noises from the channel also causes delay.
11. List out disadvantages of cellular system.
1. Self jamming
2. Near far problem
3. Soft Handoff
12. How much of the original GSM network does GPRS need. Which elements of the network perform the data transfer.
GPRS is an enhancement of SM. It uses same physical channel as GSM and only new
logical GPRS radio channels are defined.
Elements needed for data transfer:
1. GPRS support nodes (GSN)
2. Gate way GPRS Support Node (GGSN)
3. Servicing GPRS Support Node (SGSN)
4. GPRS Register (GR)
13. Explain the various entities available in radio subsystem
1. BSS: It performs all function necessary to maintain radio connections to a MS.
2. BTS: It comprises all radio equipments
3. BSC: It basically manage BTSs.
4. MS: It comprises all user equipment and software needed for communication within a
GSM network.
14. . Explain the various entities available in NSS.
NSS consist of following switches and databases.
1. MSC: They setup connection to other MSCs and to BSCs via A interface.
2. HLR: It is the most important data base which stores all user relevant information.
3. VLR: It is a dynamic data base which stores all important information needed for MS
users currently in the LA that is associated to MSC.
15. Explain the various systems available in Operation Subsystem.
Operating subsystem : It contains necessary functions for network operation and
maintenance.
1. OMC: It manages traffic monitoring , accounting and billing
2. AuC: It is used to protect user identity and data transmission.
3. EIR: It stores all device identifications registered for this network.
16. Explain the various control channels available in GSM.
1. BCCH: A BTS uses this channel to signal information to all MSs with in a cell.
2. CCCH: All information regarding connection setup between MS and BS are
exchanged via CCCH.
3. DCCH: It is used to exchange large amounts of data in less time.
17.) What is mobile routing?
Even if the location of a terminal is known to the system, it still has to route the
traffic through the network to the access point currently responsible for the wireless
terminal.
18) What are the functions which support service and connection control?
>Access point control function
>Call control and connection control function
>Network security agent
>Service control function
>Mobility management function
19. If 8 speech channels are supported on a single radio channel, and it no guard band is
assumed, what is the number of simultaneous users can be accommodated in GSM?
A time slot is GSM can only be used by one user to transmit or receive during one of the
transmission (radio) channel. That is, we can accommodate 1 user in one time slot.
Therefore, for 8 speech channels we can accommodate 8 simultaneous users in GSM.
20. Define Base Station Subsystem GPRS protocol (BSSGP).
The Base Station Subsystem GPRS protocol (BSSGP) is used to convey routing and QoSrelated
information between the BSS and SGSN. BSSGP not perform error correction and works
ontop of a Frame Relay (FR) network.
UNIT II
1. What is the primary goal of IEE 802.11?
The primary goal of the standard was the specification of a simple, robust, WLAN
which offers time bounded and asynchronous services also it should be able to operate
with multiple physical layers.
2) What are Advantages of wireless LAN?
Flexibility,
Planning,
Design,
Robustness,
Quality Service,
Cost,
Proprietary Solution,
Restriction,
Safety and Security
3) What are Design Goals of Wireless LAN?
Global Operation
Low Power
License-free Operation
Robust transmission technology
Simplified spontaneous co-operation
Easy to use
protection of investment
Safety and Security
Transparency for application
4)What are the three Low Power States provided by Bluetooth?
PARK state
HOLD state
SNIFF state
5) What are the examples for service scenarios identified in WATM ?
>Office environments
>Universities, schools, training, centres
>Industry
>Hospitals
>Home
>Networked vehicles
6) What are the different network types of BRAN?
>Hyperlan1
>Hyperlan2
>Hyper access
>Hyperlink
7) What is the main problem for WATM during handover?
The main problem for WATM during the handover is rerouting of all connections
and maintaining connection quality.
8. Why is the physical layer IEEE 802.11 subdivided.
Physical layer is subdivided into ,
PLCP (physical layer convergence protocol) . It provides a carrier sense signal called
CCA (Clear channel assessment) and provides a common PHY Service Access Point SAP
independent of transmission technology.
PMD : Physical Medium Dependent Sublayer: It handles modulation and encoding /
decoding of signals.
9. How is mobility restricted using WLANs.
WLAN: Mobile restricted with respected to the access point. When moving the mobile
entity needs to change network access point. Every moblile entity (Person, terminal) must have its own identity. An identifier is
assigned uniquely to one mobile entity.
4. Dynamic topology
20. What is tunneling?
Tunneling is used to forward packets between HA and COA. Tunnel establishes a
virtual pipe for the data packets between tunnel entry and end point. Tunnel is
nothing but sending packet through tunnel using encapsulation
MOBILE COMPUTING
2 Mark Questions
UNIT IV
1)What are the requirements for the development of mobile IP standard?
The requirements are:
a. Compatibility
b. Transparency
c. Scalability and efficiency
d. Security
2)What are the two functions of the transport layer in the internet?
The two functions of the transport layer in the internet are check summing over user data
and multiplexing de-multiplexing of data from applications.
3) What is called the exponential growth of the congestion window?
The sendor always calculate congestion window for a window start size of the congestion
window is one segment. Sender sends one packet and waits for acknowledgement. If
acknowledgement arises it raises the level of congestion window by one. If sender sends two packet if acknowledgement arrises it
raises the level of congestion window by two. This scheme raises the level of congestion window every time the acknowledges
come back, which takes roundtrip time(RTT).This is called the exponential growth of the congestion window.
4) Advantages of I-TCP:
I-TCP does not require any changes in the TCP protocol as used by the hosts in the fixed
network or other hosts in a wireless network that do not use this optimization.
Without partitioning retransmission of lost packets would take place between mobile host and correspondent host across the whole
network.
Optimization of new mechanisms is quite simple to be done in I-TCP as they only cover a single hop.
The short delay between the mobile host and foreign agent can be determined and is independent of other traffic streams.
Therefore an optimized TCP can use precise time-outs to guarantee retransmission as fast as possible.
Partitioning into two connections also allows the use of a different transport layer protocol
between the foreign agent and the mobile host or the use of compressed headers etc. The foreign agent can act as a gateway to
translate between different protocols.
5) Disadvantages of I-TCP:
The loss of the end to end semantics of TCP cause problems if the foreign agent
portioning the TCP connection crashes.
An increased handover latency is more problematic in practical use.
The foreign agent must be a trusted entity because the TCP connections end at this point.
6. What is WAP?
Wireless application protocol(WAP) is a common effort of many companies and
organizations to set up a framework for wireless and mobile web access using many different transport systems. Eg. GSM, GPRS,
UMTS
7) What is WMLBrowser?
WMLBrowser is a library that provides several functions typical for a browser, such as
prev to go back one card or refresh to update the context of the user interface.
8) Define WAP
WAP is Wireless Application Protocol.It is the basic Objetive of the WAP forum are to
bring diverse Internet content and others data service to digital cellular phones and other
wireless,mobile terminals.Moreever a protocol suite should enable global wirless communication across different wireless network
technologies. All WAP forum solution must
be:interoperable,scaleable,efficient,reliable.
9)What is HTTP?
2. Parameter problem
3. Message too big
4. Reassembly failure and Echo Request/Reply.
7.Crusoe Processor.
The power saving technology attempts to reduce the total number of transistor and replaced
function by software. Such provides better performance by consuming less power.
E.g. Crusoe processor by transmitter.
This processor is very small processor designed as 128 bit very long instruction word (VLIW).
The processor is capable of executing up to 4 operations per cycle.
8. Define FAR and FRR.
False Acceptance Rate( FAR) is defined as the probability that the system will accept a wrong
user.
False Rejection Rate (FRR) is defined as the probability that the system will reject a correct user.
For a SIM with PIN the FAR=0.01%
FRR= 0%.
9. OS Functionality.
1. User interface: Graphical Input/ Output.
2. Memory Management: Database, space, runtime systems, variables.
3. System Management: Events, alarms, data, time.
4. Communication layer: Communication via a. TCP/IP b. InfraRed.
10. Define Wireless Protocols.
In these protocols no cables are needed inorder to communicate with each other devices.
E.g. of wireless protocols are
OBEX, IrDA, Bluetooth, 802.11B.
11. Characteristics of Bluetooth.
1. Frequency band.
Bluetooth operates in the 2.45 GHz ISM band.
2.Security.
Security mechanism is defined by the Bluetooth.
3.Transmitting Capabilities.
Bluetooth is one directional and range is up to 10m. The transmitting services supplied are
synchronous and asynchronous.
4. Bandwidth.
The bandwidth is up to 1Mbps.
5. Speech
The Bluetooth supports 3 digital channels simultaneously.
6. Cost: Bluetooth is expensive.
12. Compare the Generations of mobile systems.
Generations 1G 2G 2+G 3G
Protocol AMPS, C-Net GSM,TDMA,CDMA GPRS,
HSCSD,EDGE
UMTS,WCDMA
TECHNOLOGY Analogy Circuit
-Switched
Digital Circuit Switched
Digital Circuit or
packet Switched
Digital packet
Switched
SPEECH
QUALITY
POOR HIGH HIGH HIGH
BANDWIDTH LOW LOW MEDIUM HIGH
SECURITY None Depending on
protocol ,Low to
high
HIGH HIGH
14. Why IPV4 cannot be used with mobile devices.
IPV4 has the constraints that the devices are stationary when there are mobility the
devices attaches with new point of attachment with the different IP address. Then the connection
with the old address will be broken.
Mobile IP provides a way to solve the problem and tells how to mobile devices can
communicate over IPV4.
15. Features of Mobile IPV6.
1. Auto Configuration and neighbour discovery.
2. With the use of above a mobile node can create or obtain a topologically correct CoA for the current point of attachment without
the need of FA.
3. Strong encryption and authentication features.
4. Supports greater degree of mobility when compared with IPV4.
5. Mobility transparency is yet to achieve.
16. Define IP Addressing.
A device wishing to join UPnP network should get an IP address. To get the address there
are two methods.
1. Using DHCP.
2. Using Auto IP.
The devices sends a requests to the DHCP server. If no server answers the request within
a reasonable time then the device uses AutoIP to generate an IP address from the set of
reserved IP addresses.
17. Define the concepts of Security.
1. Identification.
2. Authentication.
3. Authorization.
4. Transaction authorization.
5. Non-repudiation.
18. Define Authentication.
Authentication is to prove that who the individuals say they are .
The most common Authentication is user ID and Password.
Authentication can also be done by SIM. The Authentication is executed between the
SmartCard on the client and the Authentication software on the server side.
Password provided by the user has to be given to the smart Card before a signature can be
obtained to ensure Authentication.
19. Define TAN (Transaction Authorization Numbers).
They are secret numbers delivered to the legitimate user in blocks. The organization that
sends the TAN to the user ensure that users are aware of TAN upon the receipt of the TAN the user must acknowledge and sign
stating that they will keep the TAN blocks secretly and never reveal to any one.
20. Challenges of Device Management.
1. Tracking device location.
2. Device-user relationship (Single owner or multiple owner)
3. Version control of devices and software
4. Software updates of existing devices.
5. Installation of new software on existing devices.
6. Providing secure access to device information.